安全研究
安全漏洞
LFTP get1命令不安全下载文件名验证漏洞
发布日期:2010-06-02
更新日期:2010-07-07
受影响系统:
Alexander V. Lukyanov lftp <= 4.0.5不受影响系统:
Alexander V. Lukyanov lftp 4.0.6描述:
CVE(CAN) ID: CVE-2010-2251
lftp是一款支持多平台,支持多模式(ftp、ftps、http、https、hftp等)的基于命令行FTP客户端。
lftp中所使用的get1命令在判断下载的目标文件名时没有正确地验证服务器端所提供的文件名,远程服务器可以通过Content-Disposition头提供特制的文件名,诱骗用户将恶意文件下载到本机上。
<*来源:Solar Designer (solar@openwall.com)
Hank Leininger
链接:http://secunia.com/advisories/39861/
http://bugzilla.maptools.org/show_bug.cgi?format=multiple&id=2210
https://bugzilla.redhat.com/show_bug.cgi?format=multiple&id=602836
https://bugzilla.redhat.com/show_bug.cgi?format=multiple&id=591580
http://www.debian.org/security/2010/dsa-2085
https://www.redhat.com/support/errata/RHSA-2010-0585.html
*>
建议:
厂商补丁:
Debian
------
Debian已经为此发布了一个安全公告(DSA-2085-1)以及相应补丁:
DSA-2085-1:New lftp packages fix file overwrite vulnerability
链接:http://www.debian.org/security/2010/dsa-2085
补丁下载:
Source archives:
http://security.debian.org/pool/updates/main/l/lftp/lftp_3.7.3-1+lenny1.dsc
Size/MD5 checksum: 1059 64112d74da53a2b3fc9336618115e1eb
http://security.debian.org/pool/updates/main/l/lftp/lftp_3.7.3-1+lenny1.diff.gz
Size/MD5 checksum: 13674 09040587c1e33a732682d425a3627da2
http://security.debian.org/pool/updates/main/l/lftp/lftp_3.7.3.orig.tar.gz
Size/MD5 checksum: 1844300 576a7b1249038ba761325671dd2eba26
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/l/lftp/lftp_3.7.3-1+lenny1_alpha.deb
Size/MD5 checksum: 711424 91c615f46c5dc48adc6dd45d20076b9a
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/l/lftp/lftp_3.7.3-1+lenny1_amd64.deb
Size/MD5 checksum: 656172 15b40a343fecd7984b95e32dcda6eeed
arm architecture (ARM)
http://security.debian.org/pool/updates/main/l/lftp/lftp_3.7.3-1+lenny1_arm.deb
Size/MD5 checksum: 574538 63404d61be53f9d459ee8171e027b9c2
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/l/lftp/lftp_3.7.3-1+lenny1_armel.deb
Size/MD5 checksum: 581470 7d80d23b595a9a087c76b6bcdf83e285
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/l/lftp/lftp_3.7.3-1+lenny1_hppa.deb
Size/MD5 checksum: 671790 1cebd061da662b9cf2479eeea5c8f9a1
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/l/lftp/lftp_3.7.3-1+lenny1_i386.deb
Size/MD5 checksum: 586716 e86f9d7ae3e182c90f85b1f92924ba1c
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/l/lftp/lftp_3.7.3-1+lenny1_ia64.deb
Size/MD5 checksum: 877390 ae790318fc5101487f6871bc108ae091
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/l/lftp/lftp_3.7.3-1+lenny1_mips.deb
Size/MD5 checksum: 649034 334ee6e763e7de4c1efd7b55875e1d04
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/l/lftp/lftp_3.7.3-1+lenny1_mipsel.deb
Size/MD5 checksum: 647518 409d0d333d2370f7003ff54a4a11cab3
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/l/lftp/lftp_3.7.3-1+lenny1_powerpc.deb
Size/MD5 checksum: 613568 9bd37572fc37a038c5f17bb626a72634
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/l/lftp/lftp_3.7.3-1+lenny1_s390.deb
Size/MD5 checksum: 633538 e7b2bd269c910bd39c6cd924b62b4059
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/l/lftp/lftp_3.7.3-1+lenny1_sparc.deb
Size/MD5 checksum: 585096 85f9f06f175d544e0ac380a29e2e00e3
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
RedHat
------
RedHat已经为此发布了一个安全公告(RHSA-2010:0585-01)以及相应补丁:
RHSA-2010:0585-01:Moderate: lftp security update
链接:https://www.redhat.com/support/errata/RHSA-2010-0585.html
Alexander V. Lukyanov
---------------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://lftp.yar.ru/
浏览次数:2368
严重程度:0(网友投票)
绿盟科技给您安全的保障
